hacking & attack vector

23
Name :- Smit Shah -140410109096 T.Y Electrical 2 Sem 5 Subject :-CYBER SECURITY Topic :- Hacking & Attack vector… 1

Upload: qwerty7696

Post on 11-Apr-2017

56 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Hacking & Attack vector

Name :- Smit Shah -140410109096

T.Y Electrical 2 Sem 5

Subject:-CYBER SECURITY

Topic :- Hacking & Attack vector… 1

Page 2: Hacking & Attack vector

Contents :Meaning of Hacking.Why do people Hack??Types of Hacking.Types of Hackers.Conclusion.

2

Page 3: Hacking & Attack vector

HACKING??

The Process of attempting to gain or successfully gaining, unauthorized access to computer resources for the purpose of help or secure system is called Hacking.

Hacking is technique in which, any one can access any one’s computer without his permission.

3

Page 4: Hacking & Attack vector

Why do people hack ? To make security stronger ( Ethical Hacking ). Just for fun. Show off. Hack other systems secretly. Notify many people their thought. Steal important information. Destroy enemy’s computer network.

4

Page 5: Hacking & Attack vector

Types Of Hacking :

Website Hacking.Email Hacking.Network Hacking.Password Hacking.Online Banking Hacking.Computer Hacking.

5

Page 6: Hacking & Attack vector

Website Hacking: Hacking a website means taking control from the

website owner to a person who hacks the website. The hacker will get the username and password and

the hacker will use that website for any purpose which may sometimes to destroy some valuable information database.

6

Page 7: Hacking & Attack vector

Email Hacking : Email hacking is illicit access to an email account or email

correspondence. Ways of Email Hacking:• Personal Information.• Social Hacking.• Phishing/ Hacking Software.• Trojan Virus etc.

Email may be protected by methods such as a strong password, encryption of the contents or a digital signature. An email disclaimer may be used to warn unauthorized readers but these are thought to be ineffective.

7

Page 8: Hacking & Attack vector

Network Hacking: Network Hacking is generally means gathering information

about domain by using tools like Telnet, NslookUP, Ping, Tracert, Netstat, etc… over the network.

It also include OS Fingerprinting, Port Scanning, Port Surfing using various Tools.

These are the three most common methods of hacking a wireless network:

• Sniffing• Spoofing• Encryption Cracking

8

Page 9: Hacking & Attack vector

Password Hacking: Password cracking is the process of recovering secret

passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Most passwords can be cracked by using following techniques:

• Hashing

• Guessing

• Default Passwords

• Brute Force

• Phishing

9

Page 10: Hacking & Attack vector

Online banking Hacking: Unauthorized accessing bank accounts without knowing the

password or without permission of account holder is known as Online banking hacking.

A bank account can be accessed in many ways. When someone gets access to your account, that person can take all your funds without your knowledge.

Here are five simple tips that will help Protect Your Online Accounts:• Use Strong Password

• Protect your Computer

• Keep an eye on running processes

• Download with care

• Be careful when using unprotected public networks 10

Page 11: Hacking & Attack vector

Computer Hacking: Computer Hacking is when files on your computer are

viewed, created, or edited without your authorization.

People can gain complete access to your computer from any where in the world if your computer is turned on, unprotected, and has an internet connection. What they do, is up to them.

Remote desktop connection technique.

11

Page 12: Hacking & Attack vector

Types of Hackers

12

Page 13: Hacking & Attack vector

White-hat Hackers :The good guys who identify the security

weakness of the system or network and inform the owner about them.

13

Page 14: Hacking & Attack vector

Black-hat Hackers:A black hat is the villain or bad guy,

who crash into victim’s security to steal information and destroy the victims security network.

Also known as ‘cracker’.

14

Page 15: Hacking & Attack vector

Grey hat Hackers:A Grey hat, in the hacking community,

refers to a skilled hacker who is somewhere in between white and black hat hackers.

15

Page 16: Hacking & Attack vector

Language of hackers:

1 -> i or l3 -> e4 -> a7 -> t9 -> g0 -> o$ -> s| -> i or l

|\| -> n|\/| -> ms -> zz -> sf -> phph -> fx -> ckck -> x 16

Page 17: Hacking & Attack vector

Example:

1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|\| 1 h4ck3d 1n

I did not hack this page, it was like this when I hacked in.

17

Page 18: Hacking & Attack vector

World Famous hackers:

Stephen Wozniac

Tsutomu Shimomura

18

Page 19: Hacking & Attack vector

Kevin Mitnick

Kevin Poulsen

19

Page 20: Hacking & Attack vector

Random Fact !!!!The average age group of hackers are

aged between 14-24 yrs.…

20

Page 21: Hacking & Attack vector

Preventive measures :Install a strong anti-virus Always run a anti-virus check before you

download a program or a file from the internet.Avoid disclosing personal details like phone

number, credit card details to strangers.

21

Page 22: Hacking & Attack vector

Conclusion:

Proper ethical hackers should be employed.

Do not expose your passwords to untrusted sites.

Practice using exact web address.

Close your internet while not in use.

22

Page 23: Hacking & Attack vector

THANK YOU

23